// SPDX-License-Identifier: GPL-2.0+ /* * (C) Copyright 2000 * Wolfgang Denk, DENX Software Engineering, wd@denx.de. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include DECLARE_GLOBAL_DATA_PTR; #define DELAY_STOP_STR_MAX_LENGTH 64 #ifndef DEBUG_BOOTKEYS #define DEBUG_BOOTKEYS 0 #endif #define debug_bootkeys(fmt, args...) \ debug_cond(DEBUG_BOOTKEYS, fmt, ##args) /* Stored value of bootdelay, used by autoboot_command() */ static int stored_bootdelay; static int menukey; #if !defined(CONFIG_AUTOBOOT_STOP_STR_CRYPT) #define CONFIG_AUTOBOOT_STOP_STR_CRYPT "" #endif #if !defined(CONFIG_AUTOBOOT_STOP_STR_SHA256) #define CONFIG_AUTOBOOT_STOP_STR_SHA256 "" #endif #ifdef CONFIG_AUTOBOOT_USE_MENUKEY #define AUTOBOOT_MENUKEY CONFIG_AUTOBOOT_MENUKEY #else #define AUTOBOOT_MENUKEY 0 #endif /** * passwd_abort_crypt() - check for a crypt-style hashed key sequence to abort booting * * This checks for the user entering a password within a given time. * * The entered password is hashed via one of the crypt-style hash methods * and compared to the pre-defined value from either * the environment variable "bootstopkeycrypt" * or * the config value CONFIG_AUTOBOOT_STOP_STR_CRYPT * * In case the config value CONFIG_AUTOBOOT_NEVER_TIMEOUT has been enabled * this function never times out if the user presses the key * before starting to enter the password. * * @etime: Timeout value ticks (stop when get_ticks() reachs this) * Return: 0 if autoboot should continue, 1 if it should stop */ static int passwd_abort_crypt(uint64_t etime) { const char *crypt_env_str = env_get("bootstopkeycrypt"); char presskey[DELAY_STOP_STR_MAX_LENGTH]; u_int presskey_len = 0; int abort = 0; int never_timeout = 0; int err; if (IS_ENABLED(CONFIG_AUTOBOOT_STOP_STR_ENABLE) && !crypt_env_str) crypt_env_str = CONFIG_AUTOBOOT_STOP_STR_CRYPT; if (!crypt_env_str) return 0; /* We expect the stop-string to be newline-terminated */ do { if (tstc()) { /* Check for input string overflow */ if (presskey_len >= sizeof(presskey)) return 0; presskey[presskey_len] = getchar(); if ((presskey[presskey_len] == '\r') || (presskey[presskey_len] == '\n')) { if (IS_ENABLED(CONFIG_AUTOBOOT_NEVER_TIMEOUT) && !presskey_len) { never_timeout = 1; continue; } presskey[presskey_len] = '\0'; err = crypt_compare(crypt_env_str, presskey, &abort); if (err) debug_bootkeys( "crypt_compare() failed with: %s\n", errno_str(err)); /* you had one chance */ break; } else { presskey_len++; } } udelay(10000); } while (never_timeout || get_ticks() <= etime); return abort; } /* * Use a "constant-length" time compare function for this * hash compare: * * https://crackstation.net/hashing-security.htm */ static int slow_equals(u8 *a, u8 *b, int len) { int diff = 0; int i; for (i = 0; i < len; i++) diff |= a[i] ^ b[i]; return diff == 0; } /** * passwd_abort_sha256() - check for a hashed key sequence to abort booting * * This checks for the user entering a SHA256 hash within a given time. * * @etime: Timeout value ticks (stop when get_ticks() reachs this) * Return: 0 if autoboot should continue, 1 if it should stop */ static int passwd_abort_sha256(uint64_t etime) { const char *sha_env_str = env_get("bootstopkeysha256"); u8 sha_env[SHA256_SUM_LEN]; u8 *sha; char *presskey; char *c; const char *algo_name = "sha256"; u_int presskey_len = 0; int abort = 0; int size = sizeof(sha); int ret; if (sha_env_str == NULL) sha_env_str = CONFIG_AUTOBOOT_STOP_STR_SHA256; presskey = malloc_cache_aligned(DELAY_STOP_STR_MAX_LENGTH); c = strstr(sha_env_str, ":"); if (c && (c - sha_env_str < DELAY_STOP_STR_MAX_LENGTH)) { /* preload presskey with salt */ memcpy(presskey, sha_env_str, c - sha_env_str); presskey_len = c - sha_env_str; sha_env_str = c + 1; } /* * Generate the binary value from the environment hash value * so that we can compare this value with the computed hash * from the user input */ ret = hash_parse_string(algo_name, sha_env_str, sha_env); if (ret) { printf("Hash %s not supported!\n", algo_name); return 0; } sha = malloc_cache_aligned(SHA256_SUM_LEN); size = SHA256_SUM_LEN; /* * We don't know how long the stop-string is, so we need to * generate the sha256 hash upon each input character and * compare the value with the one saved in the environment */ do { if (tstc()) { /* Check for input string overflow */ if (presskey_len >= DELAY_STOP_STR_MAX_LENGTH) { free(presskey); free(sha); return 0; } presskey[presskey_len++] = getchar(); /* Calculate sha256 upon each new char */ hash_block(algo_name, (const void *)presskey, presskey_len, sha, &size); /* And check if sha matches saved value in env */ if (slow_equals(sha, sha_env, SHA256_SUM_LEN)) abort = 1; } udelay(10000); } while (!abort && get_ticks() <= etime); free(presskey); free(sha); return abort; } /** * passwd_abort_key() - check for a key sequence to aborted booting * * This checks for the user entering a string within a given time. * * @etime: Timeout value ticks (stop when get_ticks() reachs this) * Return: 0 if autoboot should continue, 1 if it should stop */ static int passwd_abort_key(uint64_t etime) { int abort = 0; struct { char *str; u_int len; int retry; } delaykey[] = { { .str = env_get("bootdelaykey"), .retry = 1 }, { .str = env_get("bootstopkey"), .retry = 0 }, }; char presskey[DELAY_STOP_STR_MAX_LENGTH]; int presskey_len = 0; int presskey_max = 0; int i; # ifdef CONFIG_AUTOBOOT_DELAY_STR if (delaykey[0].str == NULL) delaykey[0].str = CONFIG_AUTOBOOT_DELAY_STR; # endif # ifdef CONFIG_AUTOBOOT_STOP_STR if (delaykey[1].str == NULL) delaykey[1].str = CONFIG_AUTOBOOT_STOP_STR; # endif for (i = 0; i < sizeof(delaykey) / sizeof(delaykey[0]); i++) { delaykey[i].len = delaykey[i].str == NULL ? 0 : strlen(delaykey[i].str); delaykey[i].len = delaykey[i].len > DELAY_STOP_STR_MAX_LENGTH ? DELAY_STOP_STR_MAX_LENGTH : delaykey[i].len; presskey_max = presskey_max > delaykey[i].len ? presskey_max : delaykey[i].len; debug_bootkeys("%s key:<%s>\n", delaykey[i].retry ? "delay" : "stop", delaykey[i].str ? delaykey[i].str : "NULL"); } /* In order to keep up with incoming data, check timeout only * when catch up. */ do { if (tstc()) { if (presskey_len < presskey_max) { presskey[presskey_len++] = getchar(); } else { for (i = 0; i < presskey_max - 1; i++) presskey[i] = presskey[i + 1]; presskey[i] = getchar(); } } for (i = 0; i < sizeof(delaykey) / sizeof(delaykey[0]); i++) { if (delaykey[i].len > 0 && presskey_len >= delaykey[i].len && memcmp(presskey + presskey_len - delaykey[i].len, delaykey[i].str, delaykey[i].len) == 0) { debug_bootkeys("got %skey\n", delaykey[i].retry ? "delay" : "stop"); /* don't retry auto boot */ if (!delaykey[i].retry) bootretry_dont_retry(); abort = 1; } } udelay(10000); } while (!abort && get_ticks() <= etime); return abort; } /** * flush_stdin() - drops all pending characters from stdin */ static void flush_stdin(void) { while (tstc()) (void)getchar(); } /** * fallback_to_sha256() - check whether we should fall back to sha256 * password checking * * This checks for the environment variable `bootstopusesha256` in case * sha256-fallback has been enabled via the config setting * `AUTOBOOT_SHA256_FALLBACK`. * * Return: `false` if we must not fall-back, `true` if plain sha256 should be tried */ static bool fallback_to_sha256(void) { if (IS_ENABLED(CONFIG_AUTOBOOT_SHA256_FALLBACK)) return env_get_yesno("bootstopusesha256") == 1; else if (IS_ENABLED(CONFIG_CRYPT_PW)) return false; else return true; } /*************************************************************************** * Watch for 'delay' seconds for autoboot stop or autoboot delay string. * returns: 0 - no key string, allow autoboot 1 - got key string, abort */ static int abortboot_key_sequence(int bootdelay) { int abort; uint64_t etime = endtick(bootdelay); if (IS_ENABLED(CONFIG_AUTOBOOT_FLUSH_STDIN)) flush_stdin(); # ifdef CONFIG_AUTOBOOT_PROMPT /* * CONFIG_AUTOBOOT_PROMPT includes the %d for all boards. * To print the bootdelay value upon bootup. */ printf(CONFIG_AUTOBOOT_PROMPT, bootdelay); # endif if (IS_ENABLED(CONFIG_AUTOBOOT_ENCRYPTION)) { if (IS_ENABLED(CONFIG_CRYPT_PW) && !fallback_to_sha256()) abort = passwd_abort_crypt(etime); else abort = passwd_abort_sha256(etime); } else { abort = passwd_abort_key(etime); } if (!abort) debug_bootkeys("key timeout\n"); return abort; } static int abortboot_single_key(int bootdelay) { int abort = 0; unsigned long ts; printf("Hit any key to stop autoboot: %2d ", bootdelay); /* * Check if key already pressed */ if (tstc()) { /* we got a key press */ getchar(); /* consume input */ puts("\b\b\b 0"); abort = 1; /* don't auto boot */ } while ((bootdelay > 0) && (!abort)) { --bootdelay; /* delay 1000 ms */ ts = get_timer(0); do { if (tstc()) { /* we got a key press */ int key; abort = 1; /* don't auto boot */ bootdelay = 0; /* no more delay */ key = getchar();/* consume input */ if (IS_ENABLED(CONFIG_AUTOBOOT_USE_MENUKEY)) menukey = key; break; } udelay(10000); } while (!abort && get_timer(ts) < 1000); printf("\b\b\b%2d ", bootdelay); } putc('\n'); return abort; } static int abortboot(int bootdelay) { int abort = 0; if (bootdelay >= 0) { if (autoboot_keyed()) abort = abortboot_key_sequence(bootdelay); else abort = abortboot_single_key(bootdelay); } if (IS_ENABLED(CONFIG_SILENT_CONSOLE) && abort) gd->flags &= ~GD_FLG_SILENT; return abort; } static void process_fdt_options(const void *blob) { #ifdef CONFIG_SYS_TEXT_BASE ulong addr; /* Add an env variable to point to a kernel payload, if available */ addr = ofnode_conf_read_int("kernel-offset", 0); if (addr) env_set_addr("kernaddr", (void *)(CONFIG_SYS_TEXT_BASE + addr)); /* Add an env variable to point to a root disk, if available */ addr = ofnode_conf_read_int("rootdisk-offset", 0); if (addr) env_set_addr("rootaddr", (void *)(CONFIG_SYS_TEXT_BASE + addr)); #endif /* CONFIG_SYS_TEXT_BASE */ } const char *bootdelay_process(void) { char *s; int bootdelay; bootcount_inc(); s = env_get("bootdelay"); bootdelay = s ? (int)simple_strtol(s, NULL, 10) : CONFIG_BOOTDELAY; /* * Does it really make sense that the devicetree overrides the user * setting? It is possibly helpful for security since the device tree * may be signed whereas the environment is often loaded from storage. */ if (IS_ENABLED(CONFIG_OF_CONTROL)) bootdelay = ofnode_conf_read_int("bootdelay", bootdelay); debug("### main_loop entered: bootdelay=%d\n\n", bootdelay); if (IS_ENABLED(CONFIG_AUTOBOOT_MENU_SHOW)) bootdelay = menu_show(bootdelay); bootretry_init_cmd_timeout(); #ifdef CONFIG_POST if (gd->flags & GD_FLG_POSTFAIL) { s = env_get("failbootcmd"); } else #endif /* CONFIG_POST */ if (bootcount_error()) s = env_get("altbootcmd"); else s = env_get("bootcmd"); if (IS_ENABLED(CONFIG_OF_CONTROL)) process_fdt_options(gd->fdt_blob); stored_bootdelay = bootdelay; return s; } void autoboot_command(const char *s) { debug("### main_loop: bootcmd=\"%s\"\n", s ? s : ""); if (s && (stored_bootdelay == -2 || (stored_bootdelay != -1 && !abortboot(stored_bootdelay)))) { bool lock; int prev; lock = autoboot_keyed() && !IS_ENABLED(CONFIG_AUTOBOOT_KEYED_CTRLC); if (lock) prev = disable_ctrlc(1); /* disable Ctrl-C checking */ run_command_list(s, -1, 0); if (lock) disable_ctrlc(prev); /* restore Ctrl-C checking */ } if (IS_ENABLED(CONFIG_AUTOBOOT_USE_MENUKEY) && menukey == AUTOBOOT_MENUKEY) { s = env_get("menucmd"); if (s) run_command_list(s, -1, 0); } }